Skip to main content

CVE-2024-50188: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50188cvecve-2024-50188
Published: Fri Nov 08 2024 (11/08/2024, 05:38:29 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: phy: dp83869: fix memory corruption when enabling fiber When configuring the fiber port, the DP83869 PHY driver incorrectly calls linkmode_set_bit() with a bit mask (1 << 10) rather than a bit number (10). This corrupts some other memory location -- in case of arm64 the priv pointer in the same structure. Since the advertising flags are updated from supported at the end of the function the incorrect line isn't needed at all and can be removed.

AI-Powered Analysis

AILast updated: 06/28/2025, 12:40:47 UTC

Technical Analysis

CVE-2024-50188 is a vulnerability identified in the Linux kernel's DP83869 PHY driver, specifically affecting the handling of fiber port configuration. The issue arises because the driver incorrectly calls the function linkmode_set_bit() with a bit mask (1 << 10) instead of a bit number (10). This misuse leads to memory corruption, as the function expects a bit number to set a specific bit in a bitmap, but instead receives a mask value. On ARM64 architectures, this corruption can affect the 'priv' pointer within the same data structure, potentially leading to undefined behavior or system instability. The root cause is a programming error in the PHY driver code, where the incorrect parameter causes unintended memory modification. The vulnerability is mitigated by removing the unnecessary and incorrect call since the advertising flags are updated correctly later in the function. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The affected versions are identified by a specific commit hash, indicating this is a recent and targeted fix in the Linux kernel source code.

Potential Impact

For European organizations, the impact of CVE-2024-50188 depends largely on their use of Linux systems running on ARM64 architectures with the DP83869 PHY driver enabled, particularly in environments utilizing fiber network interfaces. Memory corruption vulnerabilities can lead to system crashes, denial of service, or potentially allow attackers to execute arbitrary code if exploited in a broader attack chain. Although no active exploits are known, the vulnerability could be leveraged in targeted attacks against critical infrastructure or embedded systems that rely on this hardware and driver combination. This is especially relevant for sectors such as telecommunications, industrial control systems, and data centers that use ARM64-based Linux devices with fiber connectivity. The corruption of pointers within kernel structures could compromise system stability and reliability, impacting availability and potentially confidentiality if exploited to escalate privileges or bypass security controls.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched version that removes the incorrect call to linkmode_set_bit() in the DP83869 PHY driver. Since the vulnerability is due to a coding error in the kernel source, applying official kernel updates or backported patches from trusted Linux distributions is the most effective mitigation. Additionally, organizations should audit their systems to identify ARM64-based Linux devices using the DP83869 PHY driver, particularly those with fiber ports enabled, to assess exposure. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable devices to untrusted networks. Monitoring kernel logs and system behavior for signs of memory corruption or instability can help detect exploitation attempts. Finally, organizations should maintain an up-to-date inventory of hardware and software to quickly respond to similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.967Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdf440

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 12:40:47 PM

Last updated: 8/18/2025, 9:03:27 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats